Skip to content

Seeps/shellcollector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 

Repository files navigation

shellcollector

HAFNIUM campaign: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/

CVE-2021-26855

CVE-2021-26857

CVE-2021-27065

CVE-2021-26858

This is a PowerShell script that will locate potential web shells created by the SYSTEM user from 1/1/2021 onwards.

Simply clone or download shellcollector.ps1 and execute in PowerShell with admin privileges.

The script will copy and archive detected files in %SYSTEMDRIVE%\CIR along with the original file paths of each file collected.

About

A script to detect Exchange post-exploit artifacts (2021 HAFNIUM campaign)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published